Learn about CVE-2023-3085, a cross-site scripting vulnerability in X-WRT luci up to version 22.10_b202303061504. Impact, mitigation, and prevention steps included.
This CVE record pertains to a cross-site scripting vulnerability identified in X-WRT luci up to version 22.10_b202303061504. The vulnerability is classified as problematic and affects the
run_action
function of the file modules/luci-base/ucode/dispatcher.uc
in the component 404 Error Template Handler
.
Understanding CVE-2023-3085
This section delves into a detailed understanding of CVE-2023-3085, including its description, impact, technical details, and mitigation strategies.
What is CVE-2023-3085?
The vulnerability in X-WRT luci allows for cross-site scripting by manipulating the
request_path
argument, potentially enabling remote attacks. Upgrading to version 22.10_b202303121313 can effectively mitigate this issue. The associated identifier for this vulnerability is VDB-230663.
The Impact of CVE-2023-3085
Given a base severity rating of "LOW," the impact of CVE-2023-3085 may lead to unauthorized access or manipulation of user data through malicious scripting, posing a risk to the confidentiality and integrity of the affected system.
Technical Details of CVE-2023-3085
This section provides insights into the vulnerability description, affected systems and versions, as well as the exploitation mechanism.
Vulnerability Description
The vulnerability arises due to inadequate input validation in the
run_action
function of X-WRT luci, which allows an attacker to inject and execute malicious scripts through the request_path
argument.
Affected Systems and Versions
X-WRT luci versions up to 22.10_b202303061504 are impacted by this vulnerability, specifically affecting the
404 Error Template Handler
.
Exploitation Mechanism
By manipulating the
request_path
argument with crafted data, threat actors can execute cross-site scripting attacks remotely, potentially compromising the security of the system.
Mitigation and Prevention
Protecting against CVE-2023-3085 involves adopting immediate steps, implementing long-term security practices, and applying necessary patches and updates.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates